Security

«« « 1 2 » »»
33 - External Config and Claim Check Pattern - Easier Management and Externalising Payloads

33 - External Config and Claim Check Pattern - Easier Management and Externalising Payloads

How often do you think about the configuration of your applications across environments/regions/deployment boundaries? What if that configuration was stored somewhere externally but centralised, to make management easier? That's the idea behind the external config pattern! How about another scenario - What about those times where you've wanted to use a messaging service, but your payload is too big? Thought about externalising that payload too? Well, that's the Claim-check pattern! Join Peter and Chris as they talk about both of these patterns in this episode of Cloud with Chris!

APIs Architecture Azure Architecture Center Cloud Design Patterns Messaging Security
29 - The Sidecar and Ambassador Patterns

29 - The Sidecar and Ambassador Patterns

Have a need to update a legacy application to use cloud concepts such as retry, circuit breaker or other features? Then the ambassador or sidecar patterns may be for you! Join Peter and Chris as they continue their journey exploring Cloud Design Patterns. In this session, they discuss the Sidecar and Ambassador Patterns.

APIs Architecture Azure Architecture Center Cloud Design Patterns Security
23 - Gatekeeper and Valet Key Patterns - Secure your APIs and Resources

23 - Gatekeeper and Valet Key Patterns - Secure your APIs and Resources

You may have joined Peter and Chris in some of their previous episodes such as the API Economy, The Backends for Frontends & Strangler Pattern, or The Anti-Corruption Layer, Gateway Aggregation and Gateway Routing patterns. They'll will be continuing our journey talking about API Cloud Design Patterns, as they talk about the Gatekeeper and Valet Key Patterns in this episode of Cloud with Chris. This is another episode in the series of Architecting for the Cloud, one pattern at a time.

APIs Architecture Azure Architecture Center Cloud Design Patterns Security
13 - Tales from the Real World - Defying DDOS

13 - Tales from the Real World - Defying DDOS

When building solutions in the cloud, security is often a pillar that we hear come up in the requirements discussion. But how does that translate into the real world? Particularly defending against DDOS attacks? Check out this episode, where Cam Adams joins Chris and talks about some of the recent work that he has been doing, helping customers defend against this.

DDOS Requirements Security
8 - Azure Security

8 - Azure Security

In this episode, we get back to a requirements based topic, and an area that will significantly impact the design of our resulting solution architecture. That topic is security! It's one of the hot topics that organisations want to discuss when moving to the cloud. So I'm pleased to be joined in this episode by another colleague, Andrew Nathan, who has a wealth of knowledge in the cyber security space.

Agile Architecture Authentication Authorization DDOS DevOps Requirements Security
«« « 1 2 » »»